Description
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
References
https://github.com/advisories/GHSA-pch5-whg9-qr2r
https://github.com/rs/node-netmask
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md
https://security.netapp.com/advisory/ntap-20210528-0010/
https://www.npmjs.com/package/netmask
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
9.1 · Critical
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-04-01T13:15:14.460
4 years agoLast modified
2023-08-08T14:22:24.967
1 year ago